Computer Network
Computer Network
1. Explain how different network topologies impact data flow in a computer network with
real-world scenarios.
o Answer: Network topologies determine the layout and data flow within a network.
Bus Topology: All devices share a single communica on line. Data collisions
are common, and the network is vulnerable to a single point of failure.
Star Topology: Devices are connected to a central hub. If the hub fails, the
en re network is affected, but individual device failures do not impact the
network.
Mesh Topology: Devices are interconnected, providing mul ple paths for
data. This increases reliability and redundancy but is complex and expensive
to implement.
2. Discuss how the OSI model facilitates troubleshoo ng in mul -vendor network
environments.
o Answer: The OSI model standardizes network func ons into seven layers, making it
easier to isolate and troubleshoot issues.
Example: If a network issue occurs, engineers can use the OSI model to
iden fy whether the problem is at the Physical layer (e.g., faulty cables), the
Data Link layer (e.g., MAC address conflicts), or higher layers (e.g.,
applica on errors).
3. Compare wired and wireless transmission media in terms of performance metrics relevant
to specific applica ons.
o Answer:
Wired Media: Generally offers higher speed, reliability, and security. Suitable
for applica ons requiring stable and high-speed connec ons, such as data
centers and office networks.
4. Describe how mul plexing techniques like FDM and TDM op mize bandwidth usage in
telecommunica ons.
o Answer:
FDM (Frequency Division Mul plexing): Divides the channel into mul ple
frequency bands, each carrying a separate signal. This allows simultaneous
transmission of mul ple signals without interference.
TDM (Time Division Mul plexing): Divides the channel into me slots, each
allocated to a different signal. This allows mul ple signals to share the same
channel by transmi ng in different me slots.
5. Illustrate with examples how hubs differ from switches in terms of network traffic
management.
o Answer:
6. Explain error detec on using parity bits through an example involving data transmission
errors.
o Answer: Parity bits are added to data to ensure that the number of 1s is even (even
parity) or odd (odd parity). If the received data has the wrong parity, an error is
detected.
Example: In an even parity system, if the data 1010 is sent, a parity bit of 0 is
added to make the total number of 1s even (10100). If the received data is
10101, an error is detected because the number of 1s is odd.
7. Discuss the role of routers in managing traffic between different IP networks using a case
study.
o Answer: Routers direct data packets between different IP networks, using rou ng
tables and protocols to determine the best path.
8. Provide a detailed explana on of Hamming code for error correc on with an example
scenario where it is used.
o Answer: Hamming code adds redundant bits to data to detect and correct single-bit
errors. The redundant bits are placed at posi ons that are powers of 2.
Example: For a 4-bit data 1011, Hamming code adds 3 redundant bits to
make it 1011011. If a single-bit error occurs, the redundant bits help iden fy
and correct the error.
9. Analyze how bridges filter network traffic using MAC addresses by describing their func on
within a LAN setup.
o Answer: Bridges connect two or more network segments and filter traffic based on
MAC addresses. They forward data only to the segment where the des na on
device is located, reducing unnecessary traffic.
Example: In a LAN with two segments, a bridge ensures that data intended
for a device in segment A is not sent to segment B, improving network
efficiency.
10. Elaborate on gateways’ role when interfacing different networking systems through
prac cal use cases.
11. Describe the func ons of the data link layer in the OSI model with real-life examples.
o Answer: The data link layer is responsible for node-to-node data transfer, error
detec on and correc on, and framing.
o Answer: Framing involves dividing data into frames for transmission. Each frame
includes a header, payload, and trailer.
Example: Ethernet frames have a header with source and des na on MAC
addresses, a payload with the data, and a trailer with error detec on codes.
13. Discuss error control techniques like Hamming code and CRC with examples.
o Answer:
14. Explain the Stop and Wait protocol for flow control with a real-life scenario.
o Answer: The sender waits for an acknowledgment before sending the next frame,
ensuring data integrity.
15. Describe the Sliding Window protocol and its types (Go-Back-N, Selec ve Repeat) with
examples.
o Answer:
Go-Back-N: The sender can send mul ple frames before needing an
acknowledgment but must retransmit all frames a er a lost frame.
Selec ve Repeat: Only the erroneous frames are retransmi ed, improving
efficiency.
16. Discuss the ALOHA protocol and its significance in network communica on with an
example.
17. Explain the CSMA/CD protocol and its applica on in Ethernet networks with a real-life
example.
o Answer: CSMA/CD helps in collision detec on and resolu on in Ethernet networks.
Devices listen for a clear channel before transmi ng and stop if a collision is
detected.
18. Describe the IEEE 802.3 standard and its importance with an example.
o Answer: IEEE 802.3 defines the standards for Ethernet networks, ensuring
interoperability between different network devices.
19. Discuss the role of MAC sub-layer protocols in network communica on with examples.
20. Explain the concept of error detec on codes and their importance with examples.
o Answer: Error detec on codes iden fy errors in transmi ed data, ensuring data
integrity.